THANK YOU FOR SUBSCRIBING
apacciooutlook | Wednesday, November 02, 2016
ANAHEIM, CA: Brocade, a provider of networking solutions, announces the availability of Ruckus Cloudpath ES 5.0 software to enable identity-based policies and secure network connections in IT enterprises. The software comes with BYOD capabilities to provide a complete end-to-end security solution in both wired and wireless devices.
Features of Cloudpath ES 5.0 software
The latest software uses x.509 digital certificates and granular policy assignment to provide public key infrastructure (PKI). It provides a faster and better experience to the end user with capability of on-boarding a device within 10 seconds. The cost efficiency is increased with better planning across wired and wireless networks. The software works with network security firewalls, client operatingsystems and other common methods of ensuring security compliance.
A “public key infrastructure” is set of software or hardware required to create and manage digital certificates. It binds the public keys with their respective user identities by means of a certificate authority.
The need of a frictionless BYOD and a common single platform for wired and wireless networks has been increasing in enterprises. An IDC report finds the U.S. mobile worker to grow from 96.2 million to 105.4 million in the forecast period 2015-2020. The Ruckus Cloudpath ES 5.0 provides mobile workforce and enterprise level security to the organisations for integrated operations and better business insights.
“Managing devices, workflow and security policies have become more complex over the last decade for businesses of all sizes,” says Kevin Koster, chief architect and Cloudpath founder, Ruckus Wireless Business Unit, Brocade. “At the same time, many companies operate in various locations with multiple wireless networks. This creates complex IT management challenges. Cloudpath software addresses these pain points by delivering better security than most of our customers have now, and at a very low price. Cloudpath also works with existing infrastructure, eliminating the need to purchase and train on new, expensive and complex dedicated security appliances.”